Login / Signup

Weak keys and plaintext recovery for the Dhall-Pal Block Cipher.

Karen KorstanjeLiam Keliher
Published in: ISCC (2015)
Keyphrases
  • block cipher
  • secret key
  • hash functions
  • ciphertext
  • smart card
  • s box
  • lightweight
  • public key
  • similarity search
  • encryption scheme
  • key management
  • private key
  • encryption algorithm